On March 1, 2016, a cross-protocol attack was announced by OpenSSL that could lead to decryption of TLS sessions by using a server supporting SSLv2 and EXPORT cipher suites as a Bleichenbacher RSA padding oracle. Note that traffic between clients and non-vulnerable servers can be decrypted provided another server supporting SSLv2 and EXPORT ciphers (even with a different protocol such as SMTP, IMAP or POP) shares the RSA keys of the non-vulnerable server. This vulnerability is known as DROWN (CVE-2016-0800).
SSLv2 is a very old security protocol with known issues, but still exists as a fallback protocol on many devices.
WLC Wireless LAN Controller
Products Not Exploitable to Vulnerability by default configuration, which do not negotiate SSLv2 traffic.
Products Not Vulnerable
NSM (server and NSM4000, NSM3000, NSMXpress appliance)
Juniper is continuing to investigate our product portfolio for affected software that is not mentioned above. As new information becomes available this document will be updated.
ScreenOS: Starting with ScreenOS 6.3.0r19, SSLv2 and SSLv3 can both be manually disabled via the 'unset ssl ssl3' CLI command.
STRM/JSA Series: Fixes will be available in STRM versions 2014.6.r4 and 2013.2.r14.
Solutions for other vulnerable products will be added as they become available.
Follow security best current practices by limiting the exploitable attack surface of critical infrastructure networking equipment. Use access lists or firewall filters to limit access to networking devices via SSL only from trusted, administrative networks or hosts.
Use an external firewall to filter all incoming SSLv2 traffic.
Ensure SSLv2 is not enabled on any systems, disable where necessary.
2016-03-14: Initial publication 2016-03-15: Added IDP signature for SSLv2 detection 2016-03-23: Added detail regarding non-exploitability of this vulnerability due to configuration of products for Junos OS and Junos Space. Added additional workaround detail to disable SSLv2 when found.